access security
Recently Published Documents


TOTAL DOCUMENTS

112
(FIVE YEARS 25)

H-INDEX

12
(FIVE YEARS 1)

2022 ◽  
Author(s):  
Ugochi Ebere Eziukwu

Small and medium enterprises (SMEs) are depending more on their ICT framework however they do not possess the ability to direct it reasonably because of monetary impediments, limited assets, and insufficient specialized expertise. A sizeable number of SME executives expect that ICT security per remote access in their organizations is only like introducing a firewall and refreshing the antivirus program as frequently on a case by case basis. Remote access initiatives, against hacking systems and approaches, remote access controls, and numerous other related aspects are only investigated solely after security breaches. To improve remote access security in an organization comprehensively, four aspects including organizational, work process, data, and technical aspects must be figured out. With SMEs’ limited spending plans and more requirements for remote employees, it is exceptionally evident that they will remain easy prey for attackers since they cannot bear the cost of the typical secure remote access technologies and solutions. This paper explored a more ideal solution that will fit into the usual SME low remote access security financial plans but at the same time sufficiently powerful to protect them from digital and other IT attacks.


2021 ◽  
Vol 10 (2) ◽  
pp. 131-144
Author(s):  
Teguh Aprianto ◽  
Abdul Fatah

The service quality at XYZ High School is still not in accordance as expected. There are still queues for registration, payments, length of academic service, parking capacity, lecture room, library access, security, and etc. This study is conducted to find out the service quality of XYZ high school towards the students' satisfaction. The methods used in this research are the integration method of Servqual, Kano and Quality Function Deployment (QFD), using 5 Servqual dimensions, those are Tangible, Reliability, Responsiveness, Assurance, and Empathy. The gap value of all service attributes provided is negative. It means that the service performance still can't fulfill the students' expectation. Based on the integration calculation of the Servqual, Kano and QFD methods, there are 16 of 31 service attributes need to be improved. The easy attribute in accessing information by online can become priority with the important level of 23.17 by constructing an online integrated information to become the priority technical response which is conducted for the improvement with the percentage of 21.04%.


2021 ◽  
Vol 5 ◽  
Author(s):  
Omarsherif Mohammed Jemal ◽  
Daniel Callo-Concha ◽  
Meine van Noordwijk

Agroforestry generally contributes to rural food and nutrition security (FNS). However, specialization on commodity-oriented agroforestry practices or management strategies can weaken local food sourcing when terms of trade fluctuate, as is the case of coffee in Ethiopia. Hence, this study assessed the trade-offs that smallholder farming households in south-western Ethiopia face between growing coffee in agroforestry systems and their food and nutrition security based on home production as well as markets. Data collected from 300 randomly selected households included: (i) attributes of agroforestry practices (AFP) and plants: structure, use type, edibility, marketability, nutritional traits, and (ii) the householders' FNS attributes: food security status, nutritional adequacy, and nutritional status. Data were collected both in food surplus and shortage seasons, during and after coffee harvesting. Within these data, the number of plant species and vegetation stories were significantly correlated with household food access security in both seasons and for all AFP identified, i.e., homegarden, multistorey-coffee-system, and multipurpose-trees-on-farmlands. The number of stories in homegardens and the richness of exotic species in multipurpose-trees-on-farmlands were significantly correlated with the biometric development of children below 5 years old during the shortage season. The richness of “actively-marketed” species in all AFP correlated with the food access security of the household, except in the multistorey-coffee-system, oriented to coffee production. Also, families that cultivate all three AFP showed significantly higher household diversity dietary during the shortage season. We conclude that no single AFP can secure FNS status of the households by itself, but the combination of all three can. Household and individual dietary scores were positively correlated with the AFP diversity-attributes, especially in the shortage season. Thus, the diversity of useful groups of plant species deserves to be promoted for instance by enriching AFP with edible and storable crops needed during the shortage season.


Author(s):  
Dawn R. Weatherford ◽  
Devin Roberson ◽  
William Blake Erickson

AbstractProfessional screeners frequently verify photograph IDs in such industries as professional security, bar tending, and sales of age-restricted materials. Moreover, security screening is a vital tool for law enforcement in the search for missing or wanted persons. Nevertheless, previous research demonstrates that novice participants fail to spot fake IDs when they are rare (i.e., the low prevalence effect; LPE). To address whether this phenomenon also occurs with professional screeners, we conducted three experiments. Experiment 1 compared security professional and non-professionals. Experiment 2 compared bar-security professionals, access-security professionals, and non-professionals. Finally, Experiment 3 added a newly created Professional Identity Training Questionnaire to determine whether and how aspects of professionals’ employment predict ID-matching accuracy. Across all three experiments, all participants were susceptible to the LPE regardless of professional status. Neither length/type of professional experience nor length/type of training experience affected ID verification performance. We discuss task performance and survey responses with aims to acknowledge and address this potential problem in real-world screening scenarios.


Author(s):  
Md. Abbas Ali Khan ◽  
Mohammad Hanif Ali ◽  
A. K. M. Fazlul Haque ◽  
Chandan Debnath ◽  
Md. Ismail Jabiullah ◽  
...  

Author(s):  
Vitthal Sadashiv Gutte ◽  
Sita Devulapalli

Correctness of data and efficient mechanisms for data security, while transferring the file to and from Cloud, are of paramount importance in today's cloud-centric processing. A mechanism for correctness and efficient transfer of data is proposed in this article. While processing users request data, a set of attributes are defined and checked. States with attributes at different levels are defined to prevent unauthorized access. Security is provided while storing the data using a chunk generation algorithm and verification of chunks using lightweight Third-Party Auditor (TPA). TPA uses digital signatures to verify user's data that are generated by RSA with MD5 algorithms. The metadata file of generated chunks is encrypted using a modified AES algorithm. The proposed method prevents unauthorized users from accessing the data in the cloud environment, in addition to maintaining data integrity. Results of the proposed cloud security model implementation are discussed.


2021 ◽  
Author(s):  
Mariah Awang ◽  
Ina Syazwani Hamzah ◽  
M. A. A. Rahman ◽  
Mohd Kamaruzaman Musa ◽  
M. M. Syafiq Syazwan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document